Perfectly Secure Message Transmission in Two Rounds

被引:7
|
作者
Spini, Gabriele [1 ,2 ,3 ]
Zemor, Gilles [1 ]
机构
[1] Univ Bordeaux, Inst Math Bordeaux, UMR 5251, 351 Cours Liberat, F-33400 Talence, France
[2] Leiden Univ, Math Inst, Leiden, Netherlands
[3] CWI Amsterdam, Amsterdam, Netherlands
来源
关键词
Perfectly Secure Message Transmission; SCHEME;
D O I
10.1007/978-3-662-53641-4_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the model that has become known as "Perfectly Secure Message Transmission" (PSMT), a sender Alice is connected to a receiver Bob through n parallel two-way channels. A computationally unbounded adversary Eve controls t of these channels, meaning she can acquire and alter any data that is transmitted over these channels. The sender Alice wishes to communicate a secret message to Bob privately and reliably, i.e. in such a way that Eve will not get any information about the message while Bob will be able to recover it completely. In this paper, we focus on protocols that work in two transmission rounds for n = 2t + 1. We break from previous work by following a conceptually simpler blueprint for achieving a PSMT protocol. We reduce the previously best-known communication complexity, i.e. the number of transmitted bits necessary to communicate a 1-bit secret, from O(n(3) log n) to O( n(2) log n). Our protocol also answers a question raised by Kurosawa and Suzuki and hitherto left open: their protocol reaches optimal transmission rate for a secret of size O(n(2) log n) bits, and the authors raised the problem of lowering this threshold. The present solution does this for a secret of O(n log n) bits.
引用
收藏
页码:286 / 304
页数:19
相关论文
共 50 条
  • [31] Brief Announcement: Perfectly Secure Message Transmission Tolerating Mobile Mixed Adversary with Reduced Phase Complexity
    Patra, Arpita
    Choudhury, Ashish
    Rangan, C. Pandu
    PODC 2010: PROCEEDINGS OF THE 2010 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING, 2010, : 245 - 246
  • [32] (ε, 0)-Secure Message Transmission
    Tuhin, Mohammed Ashraful Alam
    Shi, Hongsong
    Safavi-Naini, Rei
    2009 11TH CANADIAN WORKSHOP ON INFORMATION THEORY, 2009, : 152 - 156
  • [33] Perfect Secure Computation in Two Rounds
    Applebaum, Benny
    Brakerski, Zvika
    Tsabary, Rotem
    THEORY OF CRYPTOGRAPHY, TCC 2018, PT I, 2018, 11239 : 152 - 174
  • [34] PERFECT SECURE COMPUTATION IN TWO ROUNDS
    Applebaum, Benny
    Brakerski, Zvika
    Tsabary, Rotem
    SIAM JOURNAL ON COMPUTING, 2021, 50 (01) : 68 - 97
  • [35] Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures
    Keith M. Martin
    Maura B. Paterson
    Douglas R. Stinson
    Cryptography and Communications, 2011, 3 : 65 - 86
  • [36] Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures
    Martin, Keith M.
    Paterson, Maura B.
    Stinson, Douglas R.
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2011, 3 (02): : 65 - 86
  • [37] Secure message transmission on directed networks
    Renault, Jerome
    Renou, Ludovic
    Tomala, Tristan
    GAMES AND ECONOMIC BEHAVIOR, 2014, 85 : 1 - 18
  • [38] Secure message transmission in asynchronous networks
    Choudhury, Ashish
    Patra, Arpita
    Ashwinkumar, B. V.
    Srinathand, Kannan
    Rangan, C. Pandu
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2011, 71 (08) : 1067 - 1074
  • [39] A Virtual Wiretap Channel for Secure Message Transmission
    Sharifian, Setareh
    Safavi-Naini, Reihaneh
    Lin, Fuchun
    PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016: MALICIOUS AND EXPLORATORY CRYPTOLOGY, 2017, 10311 : 171 - 192
  • [40] Optimal Secure Message Transmission by Public Discussion
    Shi, Hongsong
    Jiang, Shaoquan
    Safavi-Naini, Reihaneh
    Tuhin, Mohammed Ashraful
    2009 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1- 4, 2009, : 1313 - +